You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reported by @alecpl on 23 May 2015 09:45 UTC as Trac ticket #1490404
The des_key should not be used for many purposes. Currently it's used to:
encrypt users IMAP passwords using 3DES algorithm,
generate session identifier using SHA-1 or MD5 algorithms,
generate anti-CSRF token using MD5 algorithms,
generate unique hash of user using MD5 algorithm.
Usage of the same cryptographic key for multiple purposes increases risk of disclosure and unauthorized usage. Additionally, partial usage of the key allows to perform brute-force guessing.
I think 2-4 could use the recently added rcube_utils::random_bytes() function which uses openssl_random_pseudo_bytes(). See 3994b3a
Forget my note about random_bytes() it's unrelated. So, we have fixed 4. and we leave 1. as a valid/basic des_key use. This means we have two cases to fix:
session 'secret' setting in rcube::session_init().
anti-csrf token generation in rcube::get_request_token().
I don't think we can just get rid of it, we need another "constant" unique identifier. So, another config option?
Reported by @alecpl on 23 May 2015 09:45 UTC as Trac ticket #1490404
The des_key should not be used for many purposes. Currently it's used to:
Usage of the same cryptographic key for multiple purposes increases risk of disclosure and unauthorized usage. Additionally, partial usage of the key allows to perform brute-force guessing.
I think 2-4 could use the recently added rcube_utils::random_bytes() function which uses openssl_random_pseudo_bytes(). See 3994b3a
Migrated-From: http://trac.roundcube.net/ticket/1490404
The text was updated successfully, but these errors were encountered: